Zeljka Zorz
Mac Trojan infects machines via unpatched Java bug
Flashback Trojan variants have been targeting Mac users since September 2011, and they have gone through a variety of changes and techniques aimed at achieving its …
Researchers link string of breaches to Chinese man
Security researchers rarely managed to trace hacking attacks back to a person or a specific entity, but it seems that Trend Micro experts have succeeded in tying a former …
Potential first Android bootkit spotted
Security researchers of US-based NQ Mobile have recently discovered what might be the first Android bootkit. Dubbed DKFBootKit, the malware piggybacks malicious payloads into …
1.5 million cards compromised in Global Payments breach
A massive breach of the processing system of Atlanta-based Global Payments has been confirmed by the company. “The company believes that the affected portion of its …
Metasploit: The Penetration Tester’s Guide
Metasploit Framework (MF), the open source tool for launching exploits against remote machines, is a well-loved instrument that allows penetration testers to automate routine …
How much does a 0-day vulnerability cost?
The market for exploits for zero-day vulnerabilities has exploded in the last year, says Adriel Desautels, the founder of Netragard, a penetration testing and vulnerability …
Fake eBay identity confirmation message hitting inboxes
Ebay users are once again targeted with fake notifications asking them to “confirm their identity”. “Dear eBay Community Member, You’re signing in from …
Facebook users targeted with account-hijacking Chrome extensions
With the steady rise in popularity of both Facebook and Google’s Chrome browser, cyber scammers have turned to targeting users of both. According to Kaspersky Lab expert …
Facebook set to change its privacy policy again
On March 15, Facebook published a draft of the changes that it plans to make to its Statement of Rights and Responsibilities, and asked users to comment on them. Among the …
Flash-based rogue AV targets users
The business of pushing rogue AV software onto unsuspecting users is quite lucrative, so it’s no wonder that cyber crooks are still doing it. But while most of the time …
Megaupload users targeted with extortion scheme
The recent shutdown of the Megaupload file hosting service by the US authorities is being actively exploited by cyber crooks who are attempting to extort money from the …
Call center employees are selling user information
Indian call center employees sell confidential data belonging to users for as little as $0.03, reports the Daily Mail. According to the news outlet, reporters from The Sunday …
Featured news
Resources
Don't miss
- Kali Linux 2025.2 delivers Bloodhound CE, CARsenal, 13 new tools
- iOS zero-click attacks used to deliver Graphite spyware (CVE-2025-43200)
- Unpacking the security complexity of no-code development platforms
- Researchers warn of ongoing Entra ID account takeover campaign
- LockBit panel data leak shows Chinese orgs among the most targeted